October 2017 Newsletter

Basic Cyber Security

Many customers we see during our daily work (and rescues) don’t even have the most basic cyber security measures in place. The author intends this article for the non-technical business owner or manager, to assist and educate the need to protect their business and computer users against ever-evolving cyber threats.

Cyber security threats are continually evolving. Viruses, worms, Trojan horses, Spyware, Phishing, Adware and Scare-ware have all been around for a long time. Lately, one particular form of malware known as Ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware, when detonated works by locking up your files using encryption. The cyber criminal then demands a ransom from the victim in bitcoins. In theory, this ransom gets a code that allows the unlocking of your vital files. However, some cyber criminals are not very honest in this respect. They just take your ransom and you don’t get a code.

Read more …

Pick-up and Drop off service

We are offering a Pick-up and Drop off service for all the customers in Christchurch as from the 4th of September 2017. Booking is required at this stage.

The Pick-up and Drop off dates would be as follow:

  • Monday and Tuesday from 8:00am to 9:30am
  • Thursday and Friday from 3:30pm to 5:00pm

This service will be free for all current and new HOST plan customers.

Christmas Specials

Ex-lease desktop computers, laptops and monitors for sale

We can source some great deals on ex-lease desktops, laptops and monitors.
Why buy new when for half the price you can get ex-lease?
The machines are ex-business-lease being a maximum of 3 years old.

Perfect for school, home and business use!


HP Elite 8300 SFF Desktop PC, i5-3470 3.2GHz Processor, 8GB RAM, 320GB HDD, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $350.00+GST


Dell Latitude E6430s Laptop Computer, i5 3rd Gen Processor, 14″ Screen, 8GB RAM, 320GB, WiFi, Webcam, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $390.00+GST

Dell 23″ All-in-One Desktop PC, i7-3770s Processor, 8GB RAM, 500GB HDD, Webcam, Windows 7 Home COA (with Windows 10 Home loaded) // Now only $550.00+GST

Note: All ex-lease computers and hardware above come with 3 months RTB warranty. All the images above for the hardware are indicative only. Limited Stock.

Optional Upgrades:

  • Ex-lease 24″ LED Monitor // Now only $105.00+GST
  • SSD Upgrade: Corsair 240GB SSD // Now only $139.00+GST
  • Warranty Upgrade: upgrade to 12 months RTB Warranty // Now only $89.00+GST

Brand New Computers for sale

Acer Veriton VX2640G SFF Desktop PC, i5-7400 Quad Core 3.0GHZ Processor, 8GB RAM, 256GB SSD, DVD-RW, Windows 10 Pro 64-BIT, 3 Years OnSite Warranty; plus FREE ACER K242HL 24″ WIDE LED MONITOR 3 Years RTB Warranty // Now only $1250.00+GST

ACER Aspire F5-573G-5919 NOTEBOOK 15.6″, i5-7200U Dual Core 2.5GHZ Processor, 8GB RAM, 1TB HDD, DVD-RW, GEFORCE 940MX 2GB, Wireless-AC, Bluetooth, Windows 10 Home, 1 Years RTB Warranty; plus FREE Wireless Mouse and Leather Laptop Bag // Now only $1190.00+GST

Note: All Brand New computers have Limited Stock. All the images above for the hardware are indicative only. Limited Stock.

Our Service Hours

CT Christchurch West is located at 252 Annex Road, Middleton, Christchurch . And the workshop operating hours has changed to Monday – Friday 8:00AM – 5:30PM, unless otherwise specially announced.

We continually offering On-Site / Call-Out services for customers in Christchurch area. For anyone outside of Christchurch or rural, we can also arrange the service.

Give us a call on 03 9282150 to solve any of your technology problems. Alternatively, you can Book a Service with us online or send your service request to us via email support@ctwest.nz .

We can Manage your Email

Are you having problems with your current email provider? Sick of not being in control? Wanting to have your emails and calendar on multiple devices seamlessly? Sick of having to change email addresses when changing internet providers?

We can help by hosting your email for you!

For a small monthly fee, you can have your email on your desktop, laptop, tablet and phone; all synchronised and showing exactly the same. If you do not currently have Outlook then this can be included.

You can select an email through us like yourname@ctmail.kiwi. Otherwise, you can choose your own domain name, meaning you can have your email address be anything you want – e.g. you@yourname.co.nz (as long as it’s not already in use)

Spread the Word and get Rewarded!

Did you know, if you refer someone to us and they use our service that we reward you with a $20 voucher? The coupon can be used on your next job with us, or you can give it to someone you love for their next job with us.

Don’t forget to ask your referrals to tell us your name as we don’t want to miss out on your voucher!

Basic Cyber Security

Many customers we see during our daily work (and rescues) don’t even have the most basic cyber security measures in place. The author intends this article for the non-technical business owner or manager, to assist and educate the need to protect their business and computer users against ever-evolving cyber threats.

Cyber security threats are continually evolving. Viruses, worms, Trojan horses, Spyware, Phishing, Adware and Scare-ware have all been around for a long time. Lately, one particular form of malware known as Ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware, when detonated works by locking up your files using encryption. The cyber criminal then demands a ransom from the victim in bitcoins. In theory this ransom gets a code that allows the unlocking of your vital files. However some cyber criminals are not very honest in this respect. They just take your ransom and you don’t get a code.

Ransomware

In all cases we have seen, humans detonate the ransomware package at an endpoint in the network. Ransomware mostly arrives in email as either an attachment or as a link to a malicious or compromised website. Ransomware spreads also from software downloads, websites and advertising delivered over online ad networks.

What can you do?

Educating yourself and your employees are the #1 defense against cyber criminals.

  • Three years ago, in the olden days, we used to say don’t open an email or attachment from someone you don’t know. These days that rule still applies, however, we have seen cases of ransomware being “redistributed” to everybody in the victim’s email address book, so it’s not just people you don’t know that you can’t trust.
  • Think about that attachment or link you are about to open. Common sense applies. Were you really expecting an invoice from your mother? Were you really expecting that traffic ticket from the police? (Think – how did the Police ever get your email address?)
  • If in doubt about an email then phone the person up and ask if they just sent you that attachment. Better to be safe than sorry.

The most basic cyber security needed on your computers and network.

  • Every endpoint in your network (Cell-phones, Laptops, Desktops, Servers etc.) must have up to date and functional business grade Anti-Virus software.
  • Apply Operating System patches. Manufacturers like Apple, Microsoft and others regularly release patches and updates to fix vulnerabilities that have been discovered (mostly by cyber criminals) in their operating systems.
  • Apply application patches. Products like Office, Adobe, Chrome to name but a few, all have vulnerabilities and exploits. As these exploits get discovered patches are released by the manufacturers to remedy the situation.
  • Always use the latest version of the operating system available. Whilst Microsoft’s Windows 7 is still around and a good operating system, Windows 10 is inherently much more secure.
  • Restrict administrative privileges. Only log in as the administrator to perform administrative functions. Your regular login (and your employees) should only have standard user rights. Why? This makes it harder for malware to be installed, as installation usually requires administrative privileges.
  • Backup your data daily. This needs to be business grade and not to a shared drive on the network. Why? Most ransomware will spread to every “share” it can find – too bad if that is your backup. With regards to ransomware the phrase “Backup or Pay up” springs to mind.

Beyond basic – The next level of cyber security measures.

Once the basics are covered off, we can then talk topics like firewalls, VPN, cloud virus and spam pre-filtering of emails, changing settings in software, 2-factor authentication, and an application that detects and stops unauthorized encryption etc. These will give a much more comprehensive solution beyond basic, however “comprehensive” is probably beyond the scope of this document titled “Basic Cyber Security” and would make it rather long and too technical.

How can Computer Troubleshooters help?

  • Businesses without their own IT resource will often need assistance in implementing these basic cyber security measures. As an IT department for the small and medium-sized businesses, Computer Troubleshooters can be your IT resource.
  • We are able to deploy a management system to your computer(s) and network that keeps a track of your Anti-Virus, Patching, and Backups etc. This system reports to our service desk when things are going away.
  • We are able to assist with your staff training, with a presentation and booklets etc.

Technical Stuff/Further Reading

NZ Government Communications Security Bureau – NZ Information Security Manual Download Page

 

BackUp or Business Continuity

The facts according to the Boston Computing Network’s Data Loss Statistics, are that 60% of companies that lose their data, will shut down within 6 months of the disaster. This is something that every business wants to avoid.

The following article provides a high-level understanding of how, as a business owner the question for you is one of Business Continuity of which Backup is a key component.

What is Business Continuity?

Business continuity involves a mindset of being proactive and putting plans, processes and systems in place, so that when the unexpected occurs you can return to normal operations with minimal delay thereby reducing the level of disruption and cost to your business.

The aim is to ensure that all essential functions can be up and running or be returned to operational status quickly during various unexpected events such as a natural disaster (Flood, Fire), cyberattacks, theft, or major IT system failure.

What is involved?

The key aspect is to develop a plan that then is well communicated and understood by your staff so they know what to do when the disaster occurs. Like all plans, if it is not communicated and shared then it’s not worth the paper that it is written on.

The process of writing the plan involves identifying the key risks, identifying the ways you can prevent those risks occurring for instance:

  • risk is data loss
  • prevention is designing and implementing a multilevel backup solution.

Then the last element of the plan is documenting the steps in responding and recovery if an incident occurs that does bring down your systems.

Businesses today are more reliant than ever on IT, one of the biggest threats these days being a cybersecurity breach. A fair portion of the plan will need to focus on recovery from an IT disaster.

The plan will need to be reviewed regularly as a business grows and circumstances change and the recovery processes should be thoroughly tested to ensure it will work.

What are your backup options?

There are many options available to businesses these days for backup. With today’s modern technologies and cloud storage services, a hybrid combination of traditional on-site backup plus off-site backup to the cloud, has become the popular choice amongst businesses wanting to ensure high levels of continuity.

The key questions in making a choice is determining the level of risk and the importance of the system and the data that is being backed up. Answering these questions will impact on the choice that you make. You can see I have not mentioned cost or price. One might ask Why? Well because you need to remember this is about having a solution that will minimise the cost of failure which will far outweigh the cost of the solution you choose.

If you are not certain about this statement ask somebody who has experienced the loss of data due to a failed system backup.

What are the traditional onsite backup options?

Onsite with machines all backing up either to tape or disc and then being stored onsite. Usually scheduled to occur daily, every couple of days, or weekly. The greatest weakness is that if something happens to the premises the backups can become corrupted and lost and an external service provider such as Kroll Ontrack may need to be used to try and recover the data.

To overcome the above weakness some business’s will transport the discs/ tapes to an offsite location where they are stored.

What is happening today?

The cost of online storage has reduced with the introduction of data centre services and the continued adoption of cloud storage services. Today most businesses will have a recovery strategy based around using cloud storage, with onsite backup devices that then replicate to a data centre.

The drivers behind this are many but one can put it down to speed of recovery, ability to quickly monitor and ensure backup has occurred, hence no unpleasant surprises if a data loss breach or cyberattack occurs.

 What next?      

The first step is to make sure you have a plan and an understanding of your options. This is where you should have a chat with your local computer troubleshooter to understand how they can help you to minimise the disruption to your business from a data loss/breach. Contact us now for free consultation.

Protecting a Business against Ransomware and Scams

Every day, every month there is a new threat to being able to conduct business effectively and efficiently. How do you protect a business from the threat of disruption whether it is a scam, virus, ransomware or simple network or internet failure?

Dr Hossein Sarrafzadeh, director of the Centre of Computational Intelligence for Cyber Security at Unitec Auckland said ransomware affected tens of thousands of people and is estimated to have profited the criminals to the tune of US$1 billion in 2016.

The majority of cyber-attacks in New Zealand still go unreported, though figures released by New Zealand’s National Cyber Security Centre (NCSC) this year showed that attacks have more than doubled since 2011.

Scams continue to become more sophisticated using modern technology to make fake emails, invoices, and websites appearing legitimate to even the most astute business person. These scams have devastating effects on businesses by eroding the investment they have made in their reputation, increasing operational costs and in certain cases crippling the business from operating.

 

This article looks at how a business can avoid becoming a victim of a scam by ensuring they have the right support and systems in place to minimise the risk of disruption.

Why does size matter?

Larger organisations have the resources, time and budgets to invest in ensuring they are not subject to an attack. As the headlines indicate even with this effort they are not always successful in defending themselves.  The reality is that as smaller organisations are hampered by the amount of money and resources they can spend on IT, means that these organisations are an easier target for the cyber criminals.  The cyber-criminal finds it easier to get in and often it takes longer to detect meaning more havoc created.

Smaller organisations are often a means to access and breach larger organisations. Why? Because the smaller organisation is often the weakest link (security wise) in a supply chain relationship thereby providing an entry point to the larger business partner.

What are the key elements to protect Business Continuity? 

One must ask if the IT environment something that can just be left alone or does it need to be looked after? The answer is obvious it needs to be managed and looked after, it needs somebody who is accountable and responsible for ensuring that the risk is minimised.

For smaller organisations this leads to either employing a resource or developing a relationship with an IT Service provider who is accountable. It makes sense to develop a relationship where the provider is on the front foot and is monitoring all key elements and maintaining an organisations systems in advance of something going wrong. This is commonsense as it is about protecting against a major disruption to a business.

The key components that need to be looked at are:

  • Data back-up/ Business continuity
  • Security of endpoints
  • Network configurations, performance and access
  • Email access and security
  • Software up to date
  • Patch management (ensuring your users are up to date on all updates to the operating system or the Anti-Virus software is the latest.)
  • Website performance and content filtering
  • Password management
  • Monitoring

The key element for a business owner is to understand how this approach shifts the nature of the relationship with your IT provider from being reactive to proactive. It means the IT provider is preventing breakdowns instead of reacting to a break down. This means a monthly fee for the maintenance rather than a call out figure. It means the provider is monitoring and using tools to remotely manage and perform maintenance activities.

What does this cost?

The key thing to remember this is an investment in ensuring a business is not disrupted. Some providers will charge per device; others will charge a monthly figure based on complexity of what they are managing; others will charge based on per user.

As a business owner understand what is included and what is not and what service agreement does the provider use. For instance, at Computer Troubleshooters we provide a 100% guarantee. Contact us now for more information.

Final Thought

Change is hard to accept for anybody and in the case of IT management it is hard for people to see the monthly outlay as an investment in their future. But this is exactly what it is. It is a strategic investment that allows a business to minimize the risk of disruption and ensure it can continue to grow and develop.

Sources of information for this article:

Watchguard: The Cyber Crime Guide for small and midsize business

Datto: WannaCry the ransomware Crisis explained

Stay Smart Online  Small business guide Protect your business in 5 minutes

Cert NZ Petya Ransomware Campaign

Increasing Business productivity: Leads to greater success?

Increasing Business productivity

For every business owner, no matter what size of business you are managing knows that a key to success is ensuring that your business is increasing staff productivity. Why? Because the more productive you are means that you are increasing the output of the business at a lower cost per unit of output which means an increase in profits. In simple terms getting more done with less.

What is the role of technology?

The answer to that is quite simple as technology permeates our daily working lives. Think about what life was like with no mobile phones, no email, no internet, no electronic calendars, no collaboration tools and technologies like Skype. Technology today is so cost effective that all businesses can now afford to use these technologies to increase productivity.

Increasing Business productivity is the absolute focus of Microsoft Office 365. It is about ensuring that staff have access to: email 24/7 on any device that they use, remote access to data through the cloud and being able to work on that data via software such as Excel and Word etc.

One of the keys for every small to medium business is to ensure that technology is being managed and implemented across the business in a smooth and seamless manner so that their people are working at optimal levels to maximize the businesses productivity resulting in the best possible results.

How does technology impact on business productivity?

Overcoming the challenges of executing on a business strategy daily is where technology has the biggest impact for businesses. Using technology to create automation of tasks allows employees to communicate faster and effectively, give employees an ability to focus on the priorities that will deliver the results that the business is looking for.

When assessing business productivity tools such as MS Office 365, it is imperative that the business understands how it will help?

How?

  • Create an open and communicative environment.
  • Connect teams virtually within the company.
  • Motivate your employees using technology.
  • Monitor business productivity and employee progress on goals. Analyze performance
  • Create a flexible workforce no matter where they are they can access what they need
  • Stay secure and compliant.

How can Computer Troubleshooters help you with Office 365?

The team at Computer Troubleshooters can help you across all stages of your implementation, from assisting you to identify the plan you need, implementing the package including the setup and migration of your email to Microsoft Office 365, to the ongoing management of your solution under a monthly subscription plan. Contact your local Computer Troubleshooters to get started.

What are the key benefits for Business Owners?

Some things to think about are:

  • Capital investment– do you prefer to invest to upgrade systems or use a pay as you go subscription model?
  • Space and operating requirements – do you need to run your own infrastructure?
  • Maintenance – would hosting dramatically reduce staff or outsource costs for your IT support?
  • Scalability – will you need to add or reduce users in the future?
  • Operating control – can you trust an external IT expert to remotely manage your systems?
  • Applications – can you use hosted applications or do you need to host locally?
  • Data usage and file sizes – are your business characteristics suitable to use hosted applications?
  • Broadband speed and capacity – can your internet bandwidth handle hosted usage?
  • Statutory data retention – does your business have a requirement to hold and protect data?

By implementing Office 365 will productivity increase?

Productivity does not increase simply by implementing Office 365 it is important that you educate your staff in how to use the technology effectively and to have identified a range of business processes and activities that can benefit from the technology and make certain you get the buy in of your staff to those changes. The lesson to remember is to have a plan of action for the change you are introducing to your business.